Abstract: This system makes use of an embedded chip that has an inductive proximity sensor, which senses the key during insertion. This is followed by the system present in the car asking the user to enter a unique password. The password consists of few characters and the car key number. The system sends a text message to the owner’s mobile stating that the car is being accessed. If the user fails to enter the correct password in three trials, a text message is sent to the owner and police with the vehicle number about the unauthorized usage and the location tracked using a GPS ,GSM module and ARM7. Apart from this if your car is stolen, a password like SMS is sent by the owner, it automatically stops the car. One more application of this project is that it is use for early accident detection. It can automatically detect traffic accidents using accelerometers along with other sensors and immediately notify owner, police station & two more contacts saved in that along with vehicle number & location of that place.
Keywords: Accident alert, accelerometer, GSM, GPS, i2c protocol, UART, vehicle tracking
References:1.Abid Khan, Ravi Mishra ―GPS – GSM Based Tracking System‖, International Journal of Engineering Trends and Technology, Volume3, Issue2, Pp: 161-169, 2012.
2.S.P. Bhumkar, V.V. Deotare, R.V.Babar ―Intelligent Car System for Accident Prevention Using ARM-7‖, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 4, Pp: 56-78, 2012.
3.B.G .Nagaraja, Ravi Rayappa, M.Mahesh,Chandrasekhar M Patil, Dr TC Manjunath:‟Design and Development of GSM based vehicle theft control system‟ Advanced Computer Control ICACC ‟09 International conference.pp148.
4.Xu Li, Wei Shu, Minglu Li, Hong-Yu Huang, Pei-En Luo, and Min-You Wu, “Performance Evaluation of Vehicle-Based Mobile Sensor Networks for Traffic Monitoring” IEEE 2009.
5.Young, Kar-Keung D. “Automated navigation and mobile vehicle control using wireless sensor network technology,” Proceedings of the IEEE International Conference on Industrial Technology, 2008.

Abstract: When sales representatives and customers negotiate, it must be confirmed that the final deals will render a high enough profit for the selling company. Large companies have different methods of doing this, one of which is to run sales simulations. Such simulation systems often need to perform complex calculations over large amounts of data, which in turn requires efficient models and algorithms. This paper intends to evaluate whether it is possible to optimize and extend an existing sales system called PCT, which is currently suffering from unacceptably high running times in its simulation process. This is done through analysis of the current implementation, followed by optimization of its models and development of efficient algorithms. The performance of these optimized and extended models is compared to the existing one in order to evaluate their improvement. The conclusion of this paper is that the simulation process in PCT can indeed be optimized and extended. The optimized models serve as a proof of concept, which shows that results identical to the original system's can be calculated within < 1% of the original running time for the largest customers.
Keywords: PCT, optimized, algorithms, simulations.
References:1.Jacobs, The pathologies of big data, Commun. ACM Vol. 52 (8) (2009) pp. 36{44.
2.R. B. Miller, Response time in man-computer conversational transactions, in: Proceedings of the December 9-11, 1968, fall joint computer conference, part I, AFIPS '68 (Fall, part I), New York, NY, USA, 1968, pp. 267{277.
3.S. C. Seow, User and system response times, in: Designing and Engineering Time: The Psychology of Time Perception in Software, Addison-Wesley Professional, 2008, pp. 33{48.
4.M. de Berg, O. Cheong, M. van Kreveld, M. Overmars, 1-dimensional range searching, in: Computational Geometry: Algorithms and Application 2ed, Springer Berlin Heidelberg, 2008, pp. 96{99.
5.Y. Manolopoulos, Y. Theodoridis, V. J. Tsotras, Advanced Database Indexing, Springer US, 2000, Ch. 3. Fundamental Access Methods, pp. 37{59.
6.Vicknair, M. Macias, Z. Zhao, X. Nan, Y. Chen, D. Wilkins, A comparison of a graph database and a relational database: a data provenance perspective, in: Proceedings of the 48th Annual Southeast Regional Conference, ACM SE '10, ACM, New York, NY, USA, 2010, pp. 42:1{42:6.
7.S. Batra, C. Tyagi, Comparative analysis of relational and graph databases, International Journal of Soft Computing and Engineering (IJSCE) Volume 2 (Issue 2) (2012) pp. 509{512.

43-46

11.

Authors:

Raju B. S, Chandra Sekhar U, Drakshayani D. N

Paper Title:

Optimization of Stereolithography Process Parameters for Part Strength using Taguchi Technique

Abstract: Mobile Ad-hoc will be a vital part of next generation network due to its flexibility, infrastructure less nature, and ease to maintenance, auto configuration, self-administration capabilities, and cost effectiveness. In MANET Cluster base routing protocol play a significant role in formation of cluster at low energy cost. Energy efficient cluster formation in MANET is one of the major issue because energy of one node in cluster may affect all other nodes and also effect on the life time of the cluster Head. This paper propose an algorithm technique – which is “Signal and Energy Efficient Clustering (SEEC)” base on the Signal level and energy of the nodes to increase the life time of Cluster head. Its emphasis on the cluster maintenance and formation at low cost the resources used that are signal strength, battery power of the node. The Performance metrics are packet delivery ratio, Network Life time, Throughput. The simulation will be done using NS2 network Simulator